Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Orbinato, Vittorio"'
Autor:
Liguori, Pietro, Marescalco, Christian, Natella, Roberto, Orbinato, Vittorio, Pianese, Luciano
As the Windows OS stands out as one of the most targeted systems, the PowerShell language has become a key tool for malicious actors and cybersecurity professionals (e.g., for penetration testing). This work explores an uncharted domain in AI code ge
Externí odkaz:
http://arxiv.org/abs/2404.12893
Advanced Persistent Threats (APTs) represent the most threatening form of attack nowadays since they can stay undetected for a long time. Adversary emulation is a proactive approach for preparing against these attacks. However, adversary emulation to
Externí odkaz:
http://arxiv.org/abs/2311.08274
Proactive approaches to security, such as adversary emulation, leverage information about threat actors and their techniques (Cyber Threat Intelligence, CTI). However, most CTI still comes in unstructured forms (i.e., natural language), such as incid
Externí odkaz:
http://arxiv.org/abs/2208.12144
Autor:
Orbinato, Vittorio
In the last years, Cyber Ranges have become a widespread solution to train professionals for responding to cyber threats and attacks. Cloud computing plays a key role in this context since it enables the creation of virtual infrastructures on which C
Externí odkaz:
http://arxiv.org/abs/2112.11233
Autor:
Liguori, Pietro, Al-Hossami, Erfan, Orbinato, Vittorio, Natella, Roberto, Shaikh, Samira, Cotroneo, Domenico, Cukic, Bojan
Writing exploits for security assessment is a challenging task. The writer needs to master programming and obfuscation techniques to develop a successful exploit. To make the task easier, we propose an approach (EVIL) to automatically generate exploi
Externí odkaz:
http://arxiv.org/abs/2109.00279
Publikováno v:
In Computers & Security February 2024 137
Publikováno v:
IEEE Transactions on Dependable and Secure Computing; November 2024, Vol. 21 Issue: 6 p5374-5387, 14p